Title - Analysis of Online User Behavior and Mechanism to Restrict the Access for Suspicious Users by using Web Mining
1) The work should fulfill the given objectives (attached herewith in notepad file)
2) Suspicious user behavior will include mentioned attacks (SQLI,XSS,CSRF,LFI,RFI,Brute,Bad Bots) as well as other non attack suspicious behavior (as per discussion, should not include good bots).
3) The work should include identification and prevention of these types of behaviors.
4) The identification and prevention of the suspicious behaviors should be based on web server log file (or before log entry gets added into the log file)
5) The work flow should be described in the form of algorithm steps and proper flowchart presentation using symbols.
6) Total amount's milestone will be released when work will get fulfilled as per expectations, requirements and after proper testing with results.
7) Time of project (as per discussion) - 13 to 15 days.
Note - Work Discussion file of idea is attached herewith with password